CN104901803A - Data interaction safety protection method based on CPK identity authentication technology - Google Patents

Data interaction safety protection method based on CPK identity authentication technology Download PDF

Info

Publication number
CN104901803A
CN104901803A CN201410409283.5A CN201410409283A CN104901803A CN 104901803 A CN104901803 A CN 104901803A CN 201410409283 A CN201410409283 A CN 201410409283A CN 104901803 A CN104901803 A CN 104901803A
Authority
CN
China
Prior art keywords
user
cpk
random number
intelligent terminal
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410409283.5A
Other languages
Chinese (zh)
Inventor
陈谦
孟俊
邱银娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Teng Yi Marketing Data Services Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201410409283.5A priority Critical patent/CN104901803A/en
Publication of CN104901803A publication Critical patent/CN104901803A/en
Pending legal-status Critical Current

Links

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides a data interaction safety protection method based on a CPK identity authentication technology. The method is applied to user login security of a user service system (S1) and interactive protection of all service data. The user service system (S1) is used for receiving a login request transmitted by a user intelligent terminal, generating a random number a and generating a CPK identification public-private key pair of the random number a by using the CPK identity authentication technology, and downwardly transmitting to the user intelligent terminal after using the CPK identification public-private key to encrypt the CPK identification public-private key pair of the random number a. A user inputs a user login command on the intelligent terminal and transmits the user service system (S1) to recognize authenticity of a user identity after encrypting the hash value which is obtained by changing the user login command. The user service system (S1) is used for generating a random number b and transmitting to the user intelligent terminal after being encrypted if the verification is passed, otherwise, returning the data of failing login. After the user registers successfully, all service data between the user intelligent terminal and the user service system (S1) uses the random number b as a session key to perform bidirectional whole secret state service data interaction.

Description

A kind of data interaction method for security protection based on CPK identification authentication technology
Technical field
The present invention relates to the mutual field of safety protection of communication data, be specifically related to a kind of data interaction method for security protection based on CPK identification authentication technology.
Background technology
Along with the Internet develops fast, all types of user service system based on the Internet emerges in an endless stream, and network has been deep into the various aspects of user's life, and user is frequently by Web vector graphic and the closely bound up all kinds of services of life, work and amusement.And on the Internet now, the safety of user's service data information interaction in the serious threat such as virus, fishing website, wooden horse, hacker, the thing that the data information of user etc. leak occurs often.
How Internet user's service system and all service datas of user are protected makes it more credible and securely just seem particularly important.Data encryption is the unique use effective method transmitted that guarantees data security.The mode that the service data cross protection of now teller system is commonly used can be divided into two classes according to the difference of Key Tpe: symmetric encipherment algorithm and rivest, shamir, adelman.Symmetric encipherment algorithm uses identical key (symmetric key) to carry out the encryption and decryption of data, encryption and decryption data speed is fast, major defect is owing to being single key, and during Long-Time Service, security of system is poor, is not easy to use under open network environment.Rivest, shamir, adelman (public key encryption) uses a pair different key, and (i.e. unsymmetrical key, comprises a PKI, can disclose; Another is private key, by the keeping of user's secret), owing to being conbined public or double key password, decode very difficult, security of system is very high, is therefore particularly suitable for using under open network environment, its major defect is that algorithm is complicated, and the speed of encryption and decryption data and efficiency are all lower.
PKI authentication system is also the asymmetric encryption authentication system of application at present, but it needs the support at third-party ca authentication center, need during checking to obtain factory public key from CA center, businessman needs to set up online CA center, cost is high, and investment is large, complex management, and the offline authentication of point-to-point can not be realized, point-to-point static keys cannot be realized and exchange.
Therefore; need a kind of new data interaction method for security protection; can by the Internet particularly user's login of the teller system of mobile Internet and the advantage of the interactively integrated rivest, shamir, adelman of customer service service data and symmetric encipherment algorithm; can realize again not needing ca authentication center; the data interaction authentication mode of point-to-point one-time pad; then greatly can improve the fail safe of teller system data interaction; no matter be that businessman or user's input cost are low simultaneously; convenient management, finally drastically increases comprehensive safety degree and the user satisfaction of user.
Summary of the invention
The present invention is for solving existing technical problem; a kind of data interaction method for security protection based on CPK identification authentication technology is proposed; without the need to ca authentication center, user's input cost can be reduced greatly, realize the mutual and certification of the complete close state data message of point-to-point overall process.
CPK technology is as a kind of novel asymmetrical cryptographic technique, be the ID authentication system of a kind of advanced person, there is good fail safe and ease for use, point-to-point offline authentication can be realized easily, need not ca authentication center, point-to-point static keys can be realized and exchange.CPK simultaneously can compatible online verification, and user can carry out online subsequent processes after identifying as required, and system is disposed succinct convenient, and upgrading flexibly.If CPK identification authentication technology can be used flexibly; CPK random number CPK identification authentication technology being generated random number identify public private key pair come encryption and decryption user log in authentication information and authentication pass through after new random number (session key); and do the session key of the encryption and decryption of all data interactions after logining successfully based on this logging request by new random number, then can realize the certification of point-to-point one-time pad and the data interaction safeguard protection of the complete close state high efficiency low cost of whole process completely.
For achieving the above object, the following technical scheme that embodiments of the invention adopt:
Based on a data interaction method for security protection for CPK identification authentication technology, the user security being applicable to the teller system of the Internet logs in and all service data cross protections, it is characterized in that comprising:
Teller system (S1) is for providing business service to user, receive user's logging request that user's intelligent terminal sends, produce random number a and also identify public private key pair with the CPK that CPK identification authentication technology generates random number a, identify PKI with the CPK of user and pass to user's intelligent terminal under after the encryption of the CPK of random number a mark public private key pair.
The enciphered data the received CPK that the CPK identity private key deciphering of user obtains random number a is identified public private key pair by user's intelligent terminal, accept user's entry password of the teller system (S1) of user's input and convert thereof into the hash value of user's entry password, and be encrypted by the hash value of CPK mark PKI to user's entry password of random number a, the data after encryption are issued teller system (S1).
Teller system (S1) the CPK identity private key of the random number a deposited in systems in which obtains the hash value of user's entry password to its deciphering and carries out contrast verification with the hash value of the user's entry password that there is S1 system.If be verified, S1 produces a random number b again, as the encryption key of symmetric cryptography, identifies after random number b encrypts by PKI send to user's intelligent terminal with the CPK of random number a; If authentication failed, then the login failure data identifying public key encryption with the CPK of random number a are sent to user's intelligent terminal.
User's intelligent terminal CPK identity private key of the random number a deposited decrypts the result.If be verified, get final product login user service system, and use corresponding business service.If authentication failed, then login failure.After user logins successfully, service datas all between user's intelligent terminal and teller system (S1) is all do session key with random number b, and the service data of carrying out two-way complete close state is mutual.
Preserve the multi-group data for authentication in described teller system (S1), the multi-group data described in each comprises IP multimedia private identity, identifies hash value and the telephony terminal number associated and the Additional Verification authorization data of PKI, user's entry password, user's entry password based on the CPK in the CPK mark public private key pair of the user of IP multimedia private identity generation.IP multimedia private identity includes but not limited to: ID card No., telephone number, name, terminal equipment No. ID etc.
The CPK identity private key in the CPK mark public private key pair of the user produced based on IP multimedia private identity is had in described user's intelligent terminal.The CPK identity private key of user is used for the decrypt data CPK of user being identified to public key encryption.User's intelligent terminal includes but not limited to: computer, smart mobile phone, PDA etc.
Described teller system (S1) is when user's service login request each time, produce a random number a (only using specifically), produce the CPK mark public private key pair of this random number a by CPK identification authentication technology again and exist in S1, the CPK of random number a identifies under after public private key pair encryption and passes to user's intelligent terminal by S1.User between user's intelligent terminal and S1 logs in certificate data and session key (user's entry password is produced by S1 after being verified) is all identify public private key pair with CPK to carry out encryption and decryption and the data interaction and the cipher key change that realize close state.
After the hash value of described teller system (S1) to user's entry password is verified, then produces a random number b and used the CPK of random number a to identify under after public key encryption and pass to user's intelligent terminal.After user logins successfully, service datas all between user's intelligent terminal and teller system (S1) is all do session key with random number b, and the service data of carrying out two-way complete close state is mutual.If S1 is to after the hash value authentication failed of user's entry password, then direct by encryption login failure data down transmission to user's intelligent terminal.
The CPK of the random number a that described teller system (S1) produces with CPK algorithm identifies public private key pair and random number b has ageing.Namely user receives user's logging request on intelligent terminal, need input user's entry password within the time of agreement; If user inputs user's entry password and is proved to be successful within the time of agreement, then all between subsequent user service system and user's intelligent terminal data interactions are all do based on random number b the encipherment protection that session key carries out bi-directional data; If exceed time or user's entry password authentication failed of agreement, the CPK of the random number a produced based on this logging request and random number a identifies public private key pair and will be dropped, process of cancelling.User logs in S1 to continue, and again need initiate new user's service login request; Teller system (S1) produces new random number a again and user's entry password is verified rear new random number b, thus achieves one-time pad.
What transmit between user's intelligent terminal and teller system (S1) is the hash value of user's entry password that user's entry password produces or corresponding hash function calculated value; Between user's intelligent terminal and teller system (S1), all data interactions are all adopt ciphertext transmission, are the complete close state data interactions of end-to-end procedure; User's intelligent terminal and teller system (S1) are connected and interaction data based on the Internet or mobile operator network.
Accompanying drawing explanation
Fig. 1 is the flow chart of all data interaction safeguard protections of teller system of the present invention and user's intelligent terminal
Embodiment
For making the object, technical solutions and advantages of the present invention clearly understand, below in conjunction with embodiment and accompanying drawing, the present invention is described in more detail.
The invention provides a kind of user security login of teller system (S1) of the Internet and the method for the mutual safeguard protection of all service datas, utilize existing CPK identification authentication technology to realize the information interaction of the complete close state of overall process of all data based on user's intelligent terminal.
Teller system (S1) is for providing teller system on the internet.When user needs to use this teller system (S1), user needs to register on S1, submits the private information of the required user ID of S1 and certification to.Private information comprises user account number mark, user's entry password, identification card number, telephony terminal number, mailbox and other identification authenticated user private information, specifically sees the type of S1 and meeting is different.Teller system (S1) extracts IP multimedia private identity according to private information, and the IP multimedia private identity CPK that CPK identification authentication technology generates user is identified public private key pair.IP multimedia private identity includes but not limited to: ID card No., telephone number, name, terminal equipment No. ID etc.The multi-group data for authentication is preserved in teller system (S1), multi-group data described in each comprises IP multimedia private identity, the CPK of user identifies PKI, the CPK of random number a identifies hash value and the telephony terminal number associated and the additional authentication information of public private key pair (temporarily producing, at every turn at random), user's entry password, user's entry password.Save the CPK identity private key of user inside user's intelligent terminal, the CPK of random number a identifies public private key pair (passing to user's intelligent terminal under producing safety by S1, at every turn at random) temporarily.The CPK identity private key of user is encrypted protection with the Password of user's intelligent terminal or password of spreading its tail.
When user need to use teller system (S1) service that provides and the data interaction safeguard protection based on CPK identification authentication technology that provides of agreement S1 mode; when user logs in S1 first time, should install on its intelligent terminal (if smart mobile phone of representative of consumer individual capacity) often used according to the requirement of S1 and serve application system accordingly.User's entry password that this service application system on user's intelligent terminal is used for S1 user inputted converts the hash value of user's entry password to and is uploaded to S1 with after the public key encryption of the random number a received by the Internet (special line, VPN mode and other modes) or the network of mobile operator; Also receive service data from user simultaneously and to its be encrypted send to S1 and from S1 enciphered message and it be decrypted be presented to user; Its function provided also comprises the amendment etc. that user logs in initial challenge.
Teller system (S1) is when user's service login request each time, produce a random number a (only for current), produce the mark public private key pair of the CPK of this random number a again (the mark public private key pair of the CPK of random number a is the same with random number by CPK identification authentication technology, only for current and its use have ageing), with the CPK of user identify PKI the CPK of random number a identified public private key pair encryption rear under pass to user's intelligent terminal.
The enciphered message the received CPK that the CPK identity private key deciphering of the user deposited obtains random number a is identified public private key pair by user's intelligent terminal, receive user's entry password of the teller system (S1) of user's input and convert thereof into the hash value of user's entry password, and be encrypted by the hash value of CPK mark PKI to user's entry password of random number a, the information after encryption is sent to S1.Teller system (S1) the CPK identity private key of the random number a deposited in systems in which obtains the hash value of user's entry password to its deciphering and carries out contrast verification with the hash value of the user's entry password that there is S1 system.If be verified, S1 produces a random number b again, logins successfully the key of rear all service data interaction symmetric cryptographies as user, identifies after random number b encrypts by PKI send to user's intelligent terminal with the CPK of random number a; If authentication failed, then the login failure information identifying public key encryption with the CPK of random number a is sent to user's intelligent terminal.The algorithm of symmetric cryptography includes but not limited to: 3DES algorithm, aes algorithm etc.
The enciphered data receiving S1 is decrypted by the CPK identity private key of the random number a deposited and draws the result by user's intelligent terminal.If be verified, get final product login user service system, and use corresponding business service.If authentication failed, then login failure.After user logins successfully, service datas all between user's intelligent terminal and teller system (S1) is all do session key with random number b, and the service data of carrying out two-way complete close state is mutual.
The proprietary protocol of a corresponding random number is had in teller system (S1), CPK for the random number to generation identifies public private key pair and random number is matched at a high speed, and the CPK of random number is identified public private key pair and random number bind with user ID, until customer service service end temporarily.When S1 receives the information much based on the CPK mark PKI of random number and the encryption of random number, the CPK identity private key of the random number of its correspondence and random number can be found fast to be decrypted.
The CPK of the random number a that teller system (S1) produces with CPK algorithm identifies public private key pair and random number b has ageing.Namely user receives user's logging request on intelligent terminal, need input user's entry password within the time of agreement; If user inputs user's entry password and is proved to be successful within the time of agreement, then all between subsequent user service system and user's intelligent terminal data interactions are all do based on random number b the encipherment protection that session key carries out bi-directional data; If exceed time or user's entry password authentication failed of agreement, the random number a produced based on this logging request and the CPK of random number a identifies public and private key and will be dropped, process of cancelling.User logs in S1 to continue, and again need initiate new user's service login request; Teller system (S1) produces new random number a again and user's entry password is verified rear new random number b, thus achieves one-time pad.
With reference to Fig. 1, the data interaction method for security protection that the present invention is based on CPK identification authentication technology comprises the following steps:
Step 101: the common service that user opens teller system (S1) on the network terminal (computer, PDA and intelligent terminal etc.) to be provided logs in passage, the request of input user totem information logs in S1.
Step 102: after teller system (S1) receives user's logging request, produces a random number a, and the CPK utilizing CPK identification authentication technology to produce this random number a identifies public private key pair (only for current user login validation).The CPK of random number a is identified public private key pair and exists in S1 by S1, is identified by the CPK of random number a under passing through the network security of the Internet (special line, VPN mode and other modes) or mobile operator after the public private key pair CPK of user identifies public key encryption and passes to user's intelligent terminal.
Step 103: user's intelligent terminal obtains the CPK mark public private key pair of random number a by receiving the CPK identity private key deciphering of information with user and saves, and receives the user's entry password required for S1 that user inputs on its intelligent terminal.User's entry password is converted to the hash value of user's entry password by user's intelligent terminal, and sends to teller system (S1) by the network security of the Internet (special line, VPN mode and other modes) or mobile operator after the hash value of user's entry password being encrypted with the CPK mark PKI of the random number a received.
Step 104: teller system (S1) the CPK identity private key deciphering of the random number a deposited obtains the hash value of user's entry password, and the hash value and the user's entry password hash value of depositing in systems in which that deciphering are obtained user's entry password carry out contrast verification.If be verified, S1 produces a random number b again as the session key logining successfully rear all data interactions, identifies after random number b encrypts by PKI send to user's intelligent terminal with the CPK of random number a; If authentication failed, then the login failure information identifying public key encryption with the CPK of random number a is sent to user's intelligent terminal.
Step 105: the CPK identity private key deciphering of user's intelligent terminal random number a is verified result.If after user logins successfully, service datas all between user's intelligent terminal and teller system (S1) is all do session key with random number b, and the service data of carrying out two-way complete close state is mutual.
If after login failed for user, user logs in S1 to continue, again new user's service login request need be initiated, step 101 ~ step 105 need be repeated, teller system (S1) produces new random number a again and user's entry password is verified rear new random number b, is used for realizing the data security certification of bi-directional data one-time pad and mutual.
The CPK of the random number that the present invention produces with CPK algorithm identifies the volume capability of public private key pair, can think infinite (by CPK theoretical system algorithm from the order of magnitude of global interconnection network users, by the public and private key length of the seed of 1G, a 1000 powers CPK that can produce 10 identifies public private key pair, its enough magnanimity).
Based on the feature of CPK identification authentication system, the information of whole login authentication process interface is all use public key encryption data, carrys out data decryption with private key, achieves user security and logs in and static keys exchange.Login successfully rear all data messages mutual be all that to carry out the transmission of the complete close state data of whole process of bi-directional data with session key mutual.
Due to the technology of the present invention application and implement very extensive, as long as need the teller system of user identity being carried out to safety verification and service data interaction that the method can both be adopted to realize the secure log of teller system and the secure interactive of all service datas.The above; be only the preferred embodiments of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; change can be expected easily or replace, all should be encompassed within protection scope of the present invention.

Claims (10)

1., based on a data interaction method for security protection for CPK identification authentication technology, the user security being applicable to the teller system of the Internet logs in and all service data cross protections, it is characterized in that comprising:
Teller system (S1) is for providing business service to user, receive user's logging request that user's intelligent terminal sends, produce random number a and also identify public private key pair with the CPK that CPK identification authentication technology generates random number a, identify PKI with the CPK of user and pass to user's intelligent terminal under after the encryption of the CPK of random number a mark public private key pair.
The enciphered data the received CPK that the CPK identity private key deciphering of user obtains random number a is identified public private key pair by user's intelligent terminal, accept user's entry password of the teller system (S1) of user's input and convert thereof into the hash value of user's entry password, and be encrypted by the hash value of CPK mark PKI to user's entry password of random number a, the data after encryption are issued teller system (S1).
Teller system (S1) the CPK identity private key of the random number a deposited in systems in which obtains the hash value of user's entry password to its deciphering and carries out contrast verification with the hash value of the user's entry password that there is S1 system.If be verified, S1 produces a random number b again, as the encryption key of symmetric cryptography, identifies after random number b encrypts by PKI send to user's intelligent terminal with the CPK of random number a; If authentication failed, then the login failure data identifying public key encryption with the CPK of random number a are sent to user's intelligent terminal.
User's intelligent terminal CPK identity private key of the random number a deposited decrypts the result.If be verified, get final product login user service system, and use corresponding business service.If authentication failed, then login failure.
After user logins successfully, service datas all between user's intelligent terminal and teller system (S1) is all do session key with random number b, and the service data of carrying out two-way complete close state is mutual.
2. a kind of data interaction method for security protection based on CPK identification authentication technology as claimed in claim 1; it is characterized in that: the CPK in above-mentioned; be exactly combined public-key scheme (Combined Public Key Cryptosystem; be called for short CPK); on elliptic curve cipher (ECC algorithm); by combinatorial matrix and Split Key Sequence composition, it is the ID authentication system of a kind of advanced person.
3. a kind of data interaction method for security protection based on CPK identification authentication technology as claimed in claim 1; it is characterized in that: in described teller system (S1), preserve the multi-group data for authentication, the multi-group data described in each comprises IP multimedia private identity, identifies hash value and the telephony terminal number associated and the Additional Verification authorization data of PKI, user's entry password, user's entry password based on the CPK in the CPK mark public private key pair of the user of IP multimedia private identity generation.IP multimedia private identity includes but not limited to: ID card No., telephone number, name, terminal equipment No. ID etc.
4. a kind of data interaction method for security protection based on CPK identification authentication technology as claimed in claim 1, is characterized in that: the CPK having the user produced based on IP multimedia private identity in described user's intelligent terminal identifies the CPK identity private key in public private key pair.The CPK identity private key of user is used for the decrypt data CPK of user being identified to public key encryption.User's intelligent terminal includes but not limited to: computer, smart mobile phone, PDA etc.
5. a kind of data interaction method for security protection based on CPK identification authentication technology as claimed in claim 1; it is characterized in that: described teller system (S1) is when user's service login request each time; produce a random number a (only using specifically); produce the CPK mark public private key pair of this random number a by CPK identification authentication technology again and exist in S1, the CPK of random number a identifies under after public private key pair encryption and passes to user's intelligent terminal by S1.User between user's intelligent terminal and S1 logs in certificate data and session key (user's entry password is produced by S1 after being verified) is all identify public private key pair with CPK to carry out encryption and decryption and the data interaction and the cipher key change that realize close state.
6. a kind of data interaction method for security protection based on CPK identification authentication technology as claimed in claim 1; it is characterized in that: after the hash value of described teller system (S1) to user's entry password is verified, then produce a random number b and used the CPK of random number a to identify under after public key encryption and pass to user's intelligent terminal.After user logins successfully, service datas all between user's intelligent terminal and teller system (S1) is all do session key with random number b, and the service data of carrying out two-way complete close state is mutual.If S1 is to after the hash value authentication failed of user's entry password, then direct by encryption login failure data down transmission to user's intelligent terminal.
7. a kind of data interaction method for security protection based on CPK identification authentication technology as described in claim 1 or 5 or 6, is characterized in that: the CPK of the random number a that described teller system (S1) CPK algorithm produces identifies public private key pair and random number b has ageing.Namely user receives user's logging request on intelligent terminal, need input user's entry password within the time of agreement; If user inputs user's entry password and is proved to be successful within the time of agreement, then all between subsequent user service system and user's intelligent terminal data interactions are all do based on random number b the encipherment protection that session key carries out bi-directional data; If exceed time or user's entry password authentication failed of agreement, the random number a produced based on this logging request and the CPK of random number a identifies public and private key and will be dropped, process of cancelling.User logs in S1 to continue, and again need initiate new user's service login request; Teller system (S1) produces new random number a again and user's entry password is verified rear new random number b, thus achieves one-time pad.
8. a kind of data interaction method for security protection based on CPK identification authentication technology as claimed in claim 1, is characterized in that: what transmit between user's intelligent terminal and teller system (S1) is the hash value of user's entry password that user's entry password produces or corresponding hash function calculated value.
9. a kind of data interaction method for security protection based on CPK identification authentication technology as claimed in claim 1; it is characterized in that: between described user's intelligent terminal and teller system (S1); all data interactions are all adopt ciphertext transmission, are the complete close state data interactions of end-to-end procedure.
10. a kind of data interaction method for security protection based on CPK identification authentication technology as claimed in claim 1, is characterized in that: user's intelligent terminal and teller system (S1) are connected and interaction data based on the Internet or mobile operator network.
CN201410409283.5A 2014-08-20 2014-08-20 Data interaction safety protection method based on CPK identity authentication technology Pending CN104901803A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410409283.5A CN104901803A (en) 2014-08-20 2014-08-20 Data interaction safety protection method based on CPK identity authentication technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410409283.5A CN104901803A (en) 2014-08-20 2014-08-20 Data interaction safety protection method based on CPK identity authentication technology

Publications (1)

Publication Number Publication Date
CN104901803A true CN104901803A (en) 2015-09-09

Family

ID=54034207

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410409283.5A Pending CN104901803A (en) 2014-08-20 2014-08-20 Data interaction safety protection method based on CPK identity authentication technology

Country Status (1)

Country Link
CN (1) CN104901803A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105282179A (en) * 2015-11-27 2016-01-27 中国电子科技集团公司第五十四研究所 Family Internet of things security control method based on CPK
CN106656992A (en) * 2016-11-03 2017-05-10 林锦吾 Information verification method
CN107592281A (en) * 2016-07-06 2018-01-16 华为技术有限公司 A kind of protection system, method and device for transmitting data
CN109302412A (en) * 2018-11-06 2019-02-01 晋商博创(北京)科技有限公司 VoIP communication processing method, terminal, server and storage medium based on CPK
CN110149209A (en) * 2019-04-15 2019-08-20 深圳奇迹智慧网络有限公司 Internet of things equipment and its method and apparatus of improve data transfer safety
CN111356118A (en) * 2018-12-20 2020-06-30 上海银基信息安全技术股份有限公司 Interactive key generation method and system, Bluetooth electronic equipment and storage medium
CN113287335A (en) * 2019-01-15 2021-08-20 中兴通讯股份有限公司 Method and apparatus for preventing user tracking, storage medium, and electronic apparatus
CN113890736A (en) * 2021-11-22 2022-01-04 国网四川省电力公司成都供电公司 Mobile terminal identity authentication method and system based on SM9 cryptographic algorithm
CN114268434A (en) * 2021-12-28 2022-04-01 晋商博创(北京)科技有限公司 Asymmetric password authentication method, device and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040133908A1 (en) * 2003-01-03 2004-07-08 Broadq, Llc Digital media system and method therefor
US20050123142A1 (en) * 2003-12-09 2005-06-09 Freeman William E. Method and apparatus for secure key replacement
CN101183938A (en) * 2007-10-22 2008-05-21 华中科技大学 Wireless network security transmission method, system and equipment
CN101286843A (en) * 2008-06-03 2008-10-15 江西省电力信息通讯有限公司 Single-point login method under point-to-point model
CN101872399A (en) * 2010-07-01 2010-10-27 武汉理工大学 Dynamic digital copyright protection method based on dual identity authentication
CN102202040A (en) * 2010-03-26 2011-09-28 联想(北京)有限公司 Client authentication method and device
US20130145140A1 (en) * 2011-12-01 2013-06-06 Htc Corporation System and method for temporary secure boot of an electronic device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040133908A1 (en) * 2003-01-03 2004-07-08 Broadq, Llc Digital media system and method therefor
US20050123142A1 (en) * 2003-12-09 2005-06-09 Freeman William E. Method and apparatus for secure key replacement
CN101183938A (en) * 2007-10-22 2008-05-21 华中科技大学 Wireless network security transmission method, system and equipment
CN101286843A (en) * 2008-06-03 2008-10-15 江西省电力信息通讯有限公司 Single-point login method under point-to-point model
CN102202040A (en) * 2010-03-26 2011-09-28 联想(北京)有限公司 Client authentication method and device
CN101872399A (en) * 2010-07-01 2010-10-27 武汉理工大学 Dynamic digital copyright protection method based on dual identity authentication
US20130145140A1 (en) * 2011-12-01 2013-06-06 Htc Corporation System and method for temporary secure boot of an electronic device

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105282179B (en) * 2015-11-27 2018-12-25 中国电子科技集团公司第五十四研究所 A method of family's Internet of Things security control based on CPK
CN105282179A (en) * 2015-11-27 2016-01-27 中国电子科技集团公司第五十四研究所 Family Internet of things security control method based on CPK
CN107592281B (en) * 2016-07-06 2022-04-05 华为技术有限公司 Protection system, method and device for transmission data
CN107592281A (en) * 2016-07-06 2018-01-16 华为技术有限公司 A kind of protection system, method and device for transmitting data
US11122428B2 (en) 2016-07-06 2021-09-14 Huawei Technologies Co., Ltd. Transmission data protection system, method, and apparatus
CN106656992A (en) * 2016-11-03 2017-05-10 林锦吾 Information verification method
CN106656992B (en) * 2016-11-03 2020-06-19 林锦吾 Information verification method
CN109302412A (en) * 2018-11-06 2019-02-01 晋商博创(北京)科技有限公司 VoIP communication processing method, terminal, server and storage medium based on CPK
CN109302412B (en) * 2018-11-06 2021-09-21 晋商博创(北京)科技有限公司 VoIP communication processing method based on CPK, terminal, server and storage medium
CN111356118B (en) * 2018-12-20 2023-07-25 上海银基信息安全技术股份有限公司 Interactive key generation method, system, bluetooth electronic device and storage medium
CN111356118A (en) * 2018-12-20 2020-06-30 上海银基信息安全技术股份有限公司 Interactive key generation method and system, Bluetooth electronic equipment and storage medium
CN113287335A (en) * 2019-01-15 2021-08-20 中兴通讯股份有限公司 Method and apparatus for preventing user tracking, storage medium, and electronic apparatus
CN113287335B (en) * 2019-01-15 2023-03-10 中兴通讯股份有限公司 Method and apparatus for preventing user tracking, storage medium, and electronic apparatus
CN110149209A (en) * 2019-04-15 2019-08-20 深圳奇迹智慧网络有限公司 Internet of things equipment and its method and apparatus of improve data transfer safety
CN113890736A (en) * 2021-11-22 2022-01-04 国网四川省电力公司成都供电公司 Mobile terminal identity authentication method and system based on SM9 cryptographic algorithm
CN113890736B (en) * 2021-11-22 2023-02-28 国网四川省电力公司成都供电公司 Mobile terminal identity authentication method and system based on SM9 cryptographic algorithm
CN114268434A (en) * 2021-12-28 2022-04-01 晋商博创(北京)科技有限公司 Asymmetric password authentication method, device and storage medium

Similar Documents

Publication Publication Date Title
CN110535868A (en) Data transmission method and system based on Hybrid Encryption algorithm
CN101789865B (en) Dedicated server used for encryption and encryption method
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN108282329B (en) Bidirectional identity authentication method and device
JP2019533384A (en) Data transmission method, apparatus and system
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN108347419A (en) Data transmission method and device
CN105447407A (en) Off-line data encryption method and decryption method and corresponding apparatus and system
CN104821944A (en) Hybrid encrypted network data security method and system
CN106878016A (en) Data is activation, method of reseptance and device
CN105553951A (en) Data transmission method and data transmission device
KR20170139570A (en) Method, apparatus and system for cloud-based encryption machine key injection
CN103036880A (en) Network information transmission method, transmission equipment and transmission system
CN104253694A (en) Encrypting method for network data transmission
CN105307165A (en) Communication method based on mobile application, server and client
KR20170035665A (en) Apparatus and method for exchanging encryption key
CN101286849A (en) Authentication system and method of a third party based on engagement arithmetic
CN107770127A (en) The transmission method and device of a kind of data
CN104424446A (en) Safety verification and transmission method and system
CN106685969A (en) Hybrid-encrypted information transmission method and transmission system
CN103118363A (en) Method, system, terminal device and platform device of secret information transmission
CN101808089A (en) Secret data transmission protection method based on isomorphism of asymmetrical encryption algorithm
CN104468126A (en) Safety communication system and method
CN110493367A (en) The non-public server of unaddressed IPv6, client computer and communication means
CN109104278A (en) A kind of encrypting and decrypting method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20160621

Address after: 610041 Sichuan city of Chengdu province Gaopeng Road No. 12 Building 1 No. 207

Applicant after: Chengdu Teng Yi Marketing Data Services Ltd

Address before: High tech Zone Gaopeng road in Chengdu city of Sichuan province 610000 No. 12 A block 207

Applicant before: Yi Xingwang

Applicant before: Chen Qian

Applicant before: Hu Hao

Applicant before: Meng Jun

DD01 Delivery of document by public notice
DD01 Delivery of document by public notice

Addressee: Chengdu Teng Yi Marketing Data Services Ltd

Document name: Notification that Application Deemed to be Withdrawn

WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150909